The image represents the proposed model of the article.
Abstract:
Today, Android is one of the most used operating systems in smartphone technology. This is the main reason, Android has become the favorite target for hackers and attacke...Show MoreMetadata
Abstract:
Today, Android is one of the most used operating systems in smartphone technology. This is the main reason, Android has become the favorite target for hackers and attackers. Malicious codes are being embedded in Android applications in such a sophisticated manner that detecting and identifying an application as a malware has become the toughest job for security providers. In terms of ingenuity and cognition, Android malware has progressed to the point where they’re more impervious to conventional detection techniques. Approaches based on machine learning have emerged as a much more effective way to tackle the intricacy and originality of developing Android threats. They function by first identifying current patterns of malware activity and then using this information to distinguish between identified threats and unidentified threats with unknown behavior. This research paper uses Reverse Engineered Android applications’ features and Machine Learning algorithms to find vulnerabilities present in Smartphone applications. Our contribution is twofold. Firstly, we propose a model that incorporates more innovative static feature sets with the largest current datasets of malware samples than conventional methods. Secondly, we have used ensemble learning with machine learning algorithms i.e., AdaBoost, Support Vector Machine (SVM), etc. to improve our model’s performance. Our experimental results and findings exhibit 96.24% accuracy to detect extracted malware from Android applications, with a 0.3 False Positive Rate (FPR). The proposed model incorporates ignored detrimental features such as permissions, intents, Application Programming Interface (API) calls, and so on, trained by feeding a solitary arbitrary feature, extracted by reverse engineering as an input to the machine.
The image represents the proposed model of the article.
Published in: IEEE Access ( Volume: 10)
Funding Agency:

Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan
Beenish Urooj received the bachelor’s degree in computer science from COMSATS University Islamabad, Wah Campus, Pakistan, in 2019, where she is currently pursuing the master’s degree in information security with the Department of Computer Science. She is also working as a part-time Graphic Designer and a Freelancer. Her conference paper about Security in SCADA Systems was declared runner up in best developmental research ...Show More
Beenish Urooj received the bachelor’s degree in computer science from COMSATS University Islamabad, Wah Campus, Pakistan, in 2019, where she is currently pursuing the master’s degree in information security with the Department of Computer Science. She is also working as a part-time Graphic Designer and a Freelancer. Her conference paper about Security in SCADA Systems was declared runner up in best developmental research ...View more

Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan
Munam Ali Shah received the B.Sc. and M.Sc. degrees in computer science from the University of Peshawar, Pakistan, in 2001 and 2003, respectively, the M.S. degree in security technologies and applications from the University of Surrey, U.K., in 2010, and the Ph.D. degree from the University of Bedfordshire, U.K., in 2013. Since July 2004, he has been associated with the Department of Computer Science, COMSATS University I...Show More
Munam Ali Shah received the B.Sc. and M.Sc. degrees in computer science from the University of Peshawar, Pakistan, in 2001 and 2003, respectively, the M.S. degree in security technologies and applications from the University of Surrey, U.K., in 2010, and the Ph.D. degree from the University of Bedfordshire, U.K., in 2013. Since July 2004, he has been associated with the Department of Computer Science, COMSATS University I...View more

WMG, University of Warwick, Coventry, U.K.
Carsten Maple (Member, IEEE) is currently a Professor of cyber systems engineering at the WMG’s Cyber Security Centre (CSC), University of Warwick. He is also the director of research in cyber security working with organizations in key sectors, such as manufacturing, healthcare, financial services, and the broader public sector to address the challenges presented by today’s global cyber environment. His interests include ...Show More
Carsten Maple (Member, IEEE) is currently a Professor of cyber systems engineering at the WMG’s Cyber Security Centre (CSC), University of Warwick. He is also the director of research in cyber security working with organizations in key sectors, such as manufacturing, healthcare, financial services, and the broader public sector to address the challenges presented by today’s global cyber environment. His interests include ...View more

Department of Distance Continuing and Computer Education, University of Sindh, Hyderabad, Pakistan
Muhammad Kamran Abbasi received the Ph.D. degree in computer science from the University of Bedfordshire, U.K. He is currently working as an Associate Professor with the Department of Distance Continuing and Computer Education, University of Sindh. His research interests include unsupervised machine learning, informatics, and educational technology.
Muhammad Kamran Abbasi received the Ph.D. degree in computer science from the University of Bedfordshire, U.K. He is currently working as an Associate Professor with the Department of Distance Continuing and Computer Education, University of Sindh. His research interests include unsupervised machine learning, informatics, and educational technology.View more

Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan
Sidra Riasat received the bachelor’s degree in computer science from Fatima Jinnah Women University. She is currently pursuing the master’s degree in information security with the Department of Computer Science, COMSATS University, Islamabad. Her research interests include cyber security, block chain smart cities, and SCADA networks.
Sidra Riasat received the bachelor’s degree in computer science from Fatima Jinnah Women University. She is currently pursuing the master’s degree in information security with the Department of Computer Science, COMSATS University, Islamabad. Her research interests include cyber security, block chain smart cities, and SCADA networks.View more

Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan
Beenish Urooj received the bachelor’s degree in computer science from COMSATS University Islamabad, Wah Campus, Pakistan, in 2019, where she is currently pursuing the master’s degree in information security with the Department of Computer Science. She is also working as a part-time Graphic Designer and a Freelancer. Her conference paper about Security in SCADA Systems was declared runner up in best developmental research in 2021 (soon to be published). Her research interests include cyber security, threat hunting, and security in industrial control systems (ICS).
Beenish Urooj received the bachelor’s degree in computer science from COMSATS University Islamabad, Wah Campus, Pakistan, in 2019, where she is currently pursuing the master’s degree in information security with the Department of Computer Science. She is also working as a part-time Graphic Designer and a Freelancer. Her conference paper about Security in SCADA Systems was declared runner up in best developmental research in 2021 (soon to be published). Her research interests include cyber security, threat hunting, and security in industrial control systems (ICS).View more

Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan
Munam Ali Shah received the B.Sc. and M.Sc. degrees in computer science from the University of Peshawar, Pakistan, in 2001 and 2003, respectively, the M.S. degree in security technologies and applications from the University of Surrey, U.K., in 2010, and the Ph.D. degree from the University of Bedfordshire, U.K., in 2013. Since July 2004, he has been associated with the Department of Computer Science, COMSATS University Islamabad, Pakistan. He is the author of more than 225 research articles published in international conferences and journals. His research interests include the IoT protocol design, QoS, and security issues in wireless communication systems and applications of machine learning. He received the Best Paper Award of the International Conference on Automation and Computing, in 2012.
Munam Ali Shah received the B.Sc. and M.Sc. degrees in computer science from the University of Peshawar, Pakistan, in 2001 and 2003, respectively, the M.S. degree in security technologies and applications from the University of Surrey, U.K., in 2010, and the Ph.D. degree from the University of Bedfordshire, U.K., in 2013. Since July 2004, he has been associated with the Department of Computer Science, COMSATS University Islamabad, Pakistan. He is the author of more than 225 research articles published in international conferences and journals. His research interests include the IoT protocol design, QoS, and security issues in wireless communication systems and applications of machine learning. He received the Best Paper Award of the International Conference on Automation and Computing, in 2012.View more

WMG, University of Warwick, Coventry, U.K.
Carsten Maple (Member, IEEE) is currently a Professor of cyber systems engineering at the WMG’s Cyber Security Centre (CSC), University of Warwick. He is also the director of research in cyber security working with organizations in key sectors, such as manufacturing, healthcare, financial services, and the broader public sector to address the challenges presented by today’s global cyber environment. His interests include information security and trust and authentication in distributed systems. He is a member of several professional societies, including the Council of Professors and Heads of Computing (CPHC) whose remit is to promote public education in computing and its applications and to provide a forum for those responsible for management and research in university computing departments. He is also an elected member to the Committee of this body. He is an Education Advisor for TIGA’s the trade association representing the U.K. games industry. He is a fellow of the British Computer Society and the Chartered Institute for IT. He is a Chartered IT professional. He also holds two Professorships in China, including a position at one of the top two control engineering departments in China.
Carsten Maple (Member, IEEE) is currently a Professor of cyber systems engineering at the WMG’s Cyber Security Centre (CSC), University of Warwick. He is also the director of research in cyber security working with organizations in key sectors, such as manufacturing, healthcare, financial services, and the broader public sector to address the challenges presented by today’s global cyber environment. His interests include information security and trust and authentication in distributed systems. He is a member of several professional societies, including the Council of Professors and Heads of Computing (CPHC) whose remit is to promote public education in computing and its applications and to provide a forum for those responsible for management and research in university computing departments. He is also an elected member to the Committee of this body. He is an Education Advisor for TIGA’s the trade association representing the U.K. games industry. He is a fellow of the British Computer Society and the Chartered Institute for IT. He is a Chartered IT professional. He also holds two Professorships in China, including a position at one of the top two control engineering departments in China.View more

Department of Distance Continuing and Computer Education, University of Sindh, Hyderabad, Pakistan
Muhammad Kamran Abbasi received the Ph.D. degree in computer science from the University of Bedfordshire, U.K. He is currently working as an Associate Professor with the Department of Distance Continuing and Computer Education, University of Sindh. His research interests include unsupervised machine learning, informatics, and educational technology.
Muhammad Kamran Abbasi received the Ph.D. degree in computer science from the University of Bedfordshire, U.K. He is currently working as an Associate Professor with the Department of Distance Continuing and Computer Education, University of Sindh. His research interests include unsupervised machine learning, informatics, and educational technology.View more

Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan
Sidra Riasat received the bachelor’s degree in computer science from Fatima Jinnah Women University. She is currently pursuing the master’s degree in information security with the Department of Computer Science, COMSATS University, Islamabad. Her research interests include cyber security, block chain smart cities, and SCADA networks.
Sidra Riasat received the bachelor’s degree in computer science from Fatima Jinnah Women University. She is currently pursuing the master’s degree in information security with the Department of Computer Science, COMSATS University, Islamabad. Her research interests include cyber security, block chain smart cities, and SCADA networks.View more